For all instances where cardholder data is transmitted or received over open, public networks:
i. Describe how the observed protocol configuration and implementation confirms that:
o The security protocols are implemented to use only secure configurations.
o The protocol implementation does not support insecure versions or configurations.